US20020165783A1 - Accounting in peer-to-peer data communication networks - Google Patents
Accounting in peer-to-peer data communication networks Download PDFInfo
- Publication number
- US20020165783A1 US20020165783A1 US09/682,608 US68260801A US2002165783A1 US 20020165783 A1 US20020165783 A1 US 20020165783A1 US 68260801 A US68260801 A US 68260801A US 2002165783 A1 US2002165783 A1 US 2002165783A1
- Authority
- US
- United States
- Prior art keywords
- accounting
- service
- user
- credential
- manager
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/954—Navigation, e.g. using categorised browsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0613—Third-party assisted
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/53—Network services using third party service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/41—Billing record details, i.e. parameters, identifiers, structure of call data record [CDR]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/43—Billing software details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/48—Secure or trusted billing, e.g. trusted elements or encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/50—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for cross-charging network operators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/51—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for resellers, retailers or service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/52—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for operator independent billing system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/53—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP using mediation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/56—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP for VoIP communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/68—Payment of value-added services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/73—Validating charges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/81—Dynamic pricing, e.g. change of tariff during call
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0112—Dynamic pricing, e.g. change of tariff during call
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0152—General billing plans, rate plans, e.g. charge rates, numbering plans, rate centers, customer accounts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0156—Secure and trusted billing, e.g. trusted elements, encryption, digital signature, codes or double check mechanisms to secure billing calculation and information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0164—Billing record, e.g. Call Data Record [CDR], Toll Ticket[TT], Automatic Message Accounting [AMA], Call Line Identifier [CLI], details, i.e. parameters, identifiers, structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0172—Mediation, i.e. device or program to reformat CDRS from one or more switches in order to adapt to one or more billing programs formats
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/01—Details of billing arrangements
- H04M2215/0196—Payment of value-added services, mainly when their charges are added on the telephone bill, e.g. payment of non-telecom services, e-commerce, on-line banking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/20—Technology dependant metering
- H04M2215/202—VoIP; Packet switched telephony
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/22—Bandwidth or usage-sensitve billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/52—Interconnection, inter-exchange, reseller billing, billing agreements between different operators, e.g. billing identifier added on the CDR in order to cross charge the other operator, inter-operator accounting, reconciliation, bill directly resellers customers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/54—Resellers-retail or service providers billing, e.g. agreements with telephone service operator, activation, charging/recharging of accounts
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2215/00—Metering arrangements; Time controlling arrangements; Time indicating arrangements
- H04M2215/70—Administration aspects, modify settings or limits or counter-check correct charges
- H04M2215/7072—Validate charges
Definitions
- the present invention relates to data communications networks, and particularly to accounting in such networks.
- Peer-to-Peer networks are networks in which each network element (peer), such as for example a user device or a server, can communicate directly with other network elements. For example, instead of sending mail to a mail server and then have the recipient download it, a peer would send the mail directly to the recipient without intermediary (other than routers and the like).
- peer such as for example a user device or a server
- Peer-to-Peer networks have been used in trusted environments, such as for example in a local network where network access is only allowed from a number of known devices.
- User authentication is unnecessary in such a trusted network, and since there is no user authentication accounting is impossible as there is know way of knowing who used a certain service. This usually is no big problem, since the peers in a trusted environment either do not expect to be paid for the services they provide or are paid by the network administrator that for instance may charge the peers a flat fee.
- the present invention is directed to a method for charging in a data communications network comprising a User, a Service Provider that provides at least one service, and an Accounting Manager.
- the Accounting Manager sends a service credential to the User and a user credential to the Service Provider.
- the User requests a service from the Service Provider that validates the request.
- the service is then initiated. After that, the Service Provider sends an accounting message to the Accounting Manager.
- the present invention is further directed to a system for charging in a data communications network.
- the system comprises a User, a Service Provider that provides at least one service, and an Accounting Manager.
- the Accounting Manager sends a service credential to the User and sends a user credential to the Service Provider.
- the User requests a service from the Service Provider using information from the service credential, and the Service Provider validates the request and sends an accounting message to the Accounting Manager.
- the present invention is further directed to a User node in a data communications network further comprising a Service Provider and an Accounting Manager.
- the User node comprises a communication unit that receives a service credential from the Accounting Manager and requests a service from the Service Provider.
- the present invention is further directed to an Accounting Manager in a data communications network further comprising a User and a Service Provider.
- the Accounting Manager comprises a communication unit that sends a service credential to the User, sends a user credential to the Service Provider, and receives an accounting message from the Service Provider.
- the present invention is further directed to a Service Provider providing at least one service in a data communications network that further comprises a User and an Accounting Manager.
- the Service Provider comprises a communication unit that receives a user credential from the Accounting Manager, receives a request for a service from the User, and sends an accounting message to the Accounting Manager.
- the present invention is further directed to a system for charging in a data communications network that further comprises a User.
- the system comprises a Service Provider that provides at least one service, and an Accounting Manager.
- the Accounting Manager is sends a service credential to the User, sends a user credential to the Service Provider, and receives a request for a service from the User.
- the Service Provider validates the service request, using information from the user credential, and sends an accounting message relating to the service to the Accounting Manager.
- FIG. 1 depicts a block chart of an exemplary network environment in which the invention may be used
- FIG. 2 depicts a signal flow chart of a preferred embodiment of the method according to the invention.
- FIG. 3 depicts a simplified block chart of an exemplary network node.
- FIG. 1 depicts a block chart of an exemplary network environment in which the invention may be used.
- a User 22 connected to the Internet 10 through an access network 12 .
- the User 22 may be a person using some kind of device to interface with the network or it may be an intelligent device.
- the User 22 may have an Internet portal 23 (hereinafter called portal) or other interface through which the User 22 can use services and browse for information. It is preferable if the User 22 has logged on to the portal 23 so that the portal 23 may act in the User′′′ 22 name directly without having the User 22 authenticate himself for example every time a service is to be used.
- the portal 23 itself is however beyond the scope of this invention.
- the network 20 further comprises an Accounting Manager 26 , also with a direct connection to the Internet 10 , that among other things is in charge of accounting for at least the services detailed in a second service list 27 that it may provide to the User 22 that may store it as service list 27 ′′, as will be further described hereinafter.
- the Accounting Storage 28 is also connected to the Accounting Manager 26 , in this case directly, but they may also be interconnected via the Internet 10 or be co-located.
- the User 22 wishes to use a service provided by the Service Provider 24 .
- the service may for example be a stock analysis or a game and the Service Provider 24 is willing to let the user partake of the service for a fee that for example may depend on the length of the utilisason.
- FIG. 2 depicts a signal flow chart of a preferred embodiment of the method according to the invention. This method allows a user to request and use a service provided by a peer, and also allows proper accounting.
- the figure shows, in a network 20 comprising for example the Internet ( 10 in FIG. 1), the User 22 , the Service Provider 24 , the Accounting Manager 26 and the Accounting Storage 28 .
- a security association is one way to authenticate an entity in a network. This may for instance be a shared secret that no one else knows about. When one entity wants to authenticate another entity it asks for their shared secret and if the response comprises the correct secret, then the other entity is authenticated.
- An example of such a secret is an encryption key.
- the first entity draws a random number and sends it to the second entity. Both entities encrypt the number using their shared encryption key.
- the second entity sends the encrypted number to the first entity that then is able to compare the two encrypted numbers. Encrypting random numbers is a way to make sure that a third entity may not learn the shared secret, as the secret is not the number itself nor its encrypted version, but rather the encryption key per se.
- PKE public key encryption
- the Accounting Manager 26 has a list ( 27 in FIG. 1) of services that it supports, i.e. that it among other things provides accounting for.
- the Accounting Manager 26 already has, perhaps during a previous session, provided the User 22 with a list of available services ( 27 ′′ in FIG. 1).
- the User 22 is able to communicate with the Service Provider 24 and the Accounting Manager 26 through an interface, such as for example the portal 23 shown in FIG. 1, or a, possibly mobile, agent (not shown) acting on the User's 22 behalf.
- an interface such as for example the portal 23 shown in FIG. 1, or a, possibly mobile, agent (not shown) acting on the User's 22 behalf.
- This Service Credential Request 202 comprises:
- the Accounting Manager 26 validates the former, step 204 , and, if the validation was successful, responds with a Service Credential 206 that 206 comprises:
- a unique accounting session identifier to be used for accounting for the User 22 for the particular use of the service (b4)
- the Accounting Manager 26 also sends a User Credential 208 to the Service Provider 24 .
- the User Credential 208 comprises:
- Policies (c5) that specify under what conditions the User 22 may access the service, such as for example lifetime, time of day, maximum number of requests, and whether the user is allowed to change his address.
- accounting policies such as for example the data that is to be collected and the maximum time between accounting messages.
- This Service Request 210 comprises:
- the Service Provider 24 then validates the Service Request 210 , step 211 , using information from the User Credential. if the Service Request 210 is validated, the service is then initiated 212 by the Service Provider 24 , the User 22 , or by the Service Provider 24 and the User 22 together, and the service session begins. During the service session the content of any messages sent between the User 22 and the Service Provider 24 are specific to the service and fall outside the scope of the invention. However, these messages may comprise an electronic signature that authenticates them to the receiving entity.
- the Service Provider 24 may send one or more Interim Accounting messages 214 to the Accounting Manager 26 .
- Each Interim Accounting messages 214 comprises:
- the Accounting Manager 26 may respond with an Acknowledgement 216 .
- the User 22 or the Service Provider 24 may terminate the service session, step 218 .
- a unique accounting message identifier [0070]
- the Accounting Manager acknowledges the Final Accounting message 220 with an acknowledgement 221 .
- FIG. 3 depicts an exemplary network node such as for example an Accounting Manager 26 .
- the network node 30 comprises a communication unit 31 for communication with other nodes in the network and a processing unit 32 for processing data.
- the network node also has a network address 33 .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Databases & Information Systems (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Economics (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Data Mining & Analysis (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Meter Arrangements (AREA)
Abstract
The invention is a method, a system, and network nodes for charging for services in a data communications network having a User, a Service Provider, an Accounting Manager and an Accounting Storage. When a user wants to access a service, it sends a request to the Accounting Manager that validates the request in order to send a service credential to the User and a user credential to the Service Provider. The User then sends a service request to the Service Provider and the requested service is initiated. When the service is terminated, the Service Provider sends an accounting message to the Accounting Manager that sends the accounting data to the Accounting Storage that stores the data, and, upon reception of an acknowledgement, deletes the data it sent to the Accounting Storage. Also described are the system and the network nodes for carrying out the invention.
Description
- PRIORITY STATEMENT UNDER 35 U.S.C.119(e) & 37 C.F.R.S.1.78. This non-provisional patent application claims priority based upon the prior U.S. provisional patent application entitled “Software Deployment, Accounting and Personal Portal”, application No. 60/287,734 filed May 2, 2001, in the name of GONTHIER Jean-Charles, RICHER Eric, HOST Gerald, JODOIN Pierre-Luc, FOURNIER Nicolas, MALTAIS Robert Claude, VAN BUNNINGEN Thomas, HARNOIS Serge, WALLNER Sabine, BRASK Patrik
- 1. Technical Field of the Invention
- The present invention relates to data communications networks, and particularly to accounting in such networks.
- 2. Description of Related Art
- Peer-to-Peer networks are networks in which each network element (peer), such as for example a user device or a server, can communicate directly with other network elements. For example, instead of sending mail to a mail server and then have the recipient download it, a peer would send the mail directly to the recipient without intermediary (other than routers and the like).
- To the present day, Peer-to-Peer networks have been used in trusted environments, such as for example in a local network where network access is only allowed from a number of known devices. User authentication is unnecessary in such a trusted network, and since there is no user authentication accounting is impossible as there is know way of knowing who used a certain service. This usually is no big problem, since the peers in a trusted environment either do not expect to be paid for the services they provide or are paid by the network administrator that for instance may charge the peers a flat fee.
- In an open network environment, i.e. a network that is accessible by “anyone”, service providers usually expect to be paid for the services they provide. In these open networks, the users must be authenticated in order for real accounting for the use of services to be possible. Furthermore, peers that provide a service often have no own means to perform authentication and accounting.
- It can therefore be appreciated that there is a need for a solution that overcomes the problems and limitations of the prior art by providing secure charging. This invention provides such a solution.
- The present invention is directed to a method for charging in a data communications network comprising a User, a Service Provider that provides at least one service, and an Accounting Manager. The Accounting Manager sends a service credential to the User and a user credential to the Service Provider. The User requests a service from the Service Provider that validates the request. The service is then initiated. After that, the Service Provider sends an accounting message to the Accounting Manager.
- The present invention is further directed to a system for charging in a data communications network. The system comprises a User, a Service Provider that provides at least one service, and an Accounting Manager. The Accounting Manager sends a service credential to the User and sends a user credential to the Service Provider. The User requests a service from the Service Provider using information from the service credential, and the Service Provider validates the request and sends an accounting message to the Accounting Manager.
- The present invention is further directed to a User node in a data communications network further comprising a Service Provider and an Accounting Manager. The User node comprises a communication unit that receives a service credential from the Accounting Manager and requests a service from the Service Provider.
- The present invention is further directed to an Accounting Manager in a data communications network further comprising a User and a Service Provider. The Accounting Manager comprises a communication unit that sends a service credential to the User, sends a user credential to the Service Provider, and receives an accounting message from the Service Provider.
- The present invention is further directed to a Service Provider providing at least one service in a data communications network that further comprises a User and an Accounting Manager. The Service Provider comprises a communication unit that receives a user credential from the Accounting Manager, receives a request for a service from the User, and sends an accounting message to the Accounting Manager.
- The present invention is further directed to a system for charging in a data communications network that further comprises a User. The system comprises a Service Provider that provides at least one service, and an Accounting Manager. The Accounting Manager is sends a service credential to the User, sends a user credential to the Service Provider, and receives a request for a service from the User. The Service Provider validates the service request, using information from the user credential, and sends an accounting message relating to the service to the Accounting Manager.
- A more complete understanding of the present invention may be had by reference to the following Detailed Description when taken in conjunction with the accompanying drawings wherein:
- FIG. 1 depicts a block chart of an exemplary network environment in which the invention may be used;
- FIG. 2 depicts a signal flow chart of a preferred embodiment of the method according to the invention; and
- FIG. 3 depicts a simplified block chart of an exemplary network node.
- Reference is now made to the Drawings, where FIG. 1 depicts a block chart of an exemplary network environment in which the invention may be used. In the
network 20, is shown aUser 22 connected to the Internet 10 through anaccess network 12. TheUser 22 may be a person using some kind of device to interface with the network or it may be an intelligent device. TheUser 22 may have an Internet portal 23 (hereinafter called portal) or other interface through which theUser 22 can use services and browse for information. It is preferable if theUser 22 has logged on to theportal 23 so that theportal 23 may act in the User′″ 22 name directly without having theUser 22 authenticate himself for example every time a service is to be used. Theportal 23 itself is however beyond the scope of this invention. - There is further a
Service Provider 24, with a direct connection to the Internet 10, that is willing to provide services detailed in afirst service list 25 to theUser 22 for money. Thenetwork 20 further comprises anAccounting Manager 26, also with a direct connection to the Internet 10, that among other things is in charge of accounting for at least the services detailed in asecond service list 27 that it may provide to theUser 22 that may store it asservice list 27″, as will be further described hereinafter. There is also anAccounting Storage 28 in which accounting data are stored. TheAccounting Storage 28 is connected to theAccounting Manager 26, in this case directly, but they may also be interconnected via the Internet 10 or be co-located. - In an exemplary scenario, the
User 22 wishes to use a service provided by theService Provider 24. The service may for example be a stock analysis or a game and theService Provider 24 is willing to let the user partake of the service for a fee that for example may depend on the length of the utilisason. - FIG. 2 depicts a signal flow chart of a preferred embodiment of the method according to the invention. This method allows a user to request and use a service provided by a peer, and also allows proper accounting. The figure shows, in a
network 20 comprising for example the Internet (10 in FIG. 1), theUser 22, theService Provider 24, theAccounting Manager 26 and theAccounting Storage 28. - It will be assumed that both the
User 22 and theService Provider 24 each have a valid security association, also called a trust relationship, with theAccounting Manager 26. - A security association is one way to authenticate an entity in a network. This may for instance be a shared secret that no one else knows about. When one entity wants to authenticate another entity it asks for their shared secret and if the response comprises the correct secret, then the other entity is authenticated. An example of such a secret is an encryption key. The first entity draws a random number and sends it to the second entity. Both entities encrypt the number using their shared encryption key. The second entity sends the encrypted number to the first entity that then is able to compare the two encrypted numbers. Encrypting random numbers is a way to make sure that a third entity may not learn the shared secret, as the secret is not the number itself nor its encrypted version, but rather the encryption key per se.
- Another example is public key encryption (PKE) where an entity has a private key that only the entity itself knows and a public key that may be known to the entire world. A message encrypted with the public key may only be decrypted with the corresponding private key, and vice versa. Hence, a message encrypted with the private key may be said to have been signed by the corresponding entity; an electronic signature so to speak.
- This way an entity that only knows the public key of one entity, may ask that entity for the public keys of other entities. Thus, two entities that previously did not know each other's public keys may gain knowledge of this, usually through an entity they both trust.
- A person skilled in the art will appreciate that these were merely two examples of security associations and that other variants exist.
- It will further be assumed that the
Accounting Manager 26 has a list (27 in FIG. 1) of services that it supports, i.e. that it among other things provides accounting for. - The
Accounting Manager 26 already has, perhaps during a previous session, provided theUser 22 with a list of available services (27″ in FIG. 1). - The
User 22 is able to communicate with theService Provider 24 and theAccounting Manager 26 through an interface, such as for example the portal 23 shown in FIG. 1, or a, possibly mobile, agent (not shown) acting on the User's 22 behalf. - Turning now to the description of the steps of the method according to the invention.
- The
User 22 selects a service in the list of services,step 201, whereupon aService Credential Request 202 is sent to theAccounting Manager 26. ThisService Credential Request 202 comprises: - An indication of the requested service. (al)
- A unique identifier for the
Service Credential Request 202. (a2) - A random number to be used for authentication using the security association. (a3)
- An electronic signature that authenticates the
User 22 to theAccounting Manager 26. (a4) - A Certificate (e.g. according to the X.509 standard). (a5)
- Upon reception of the
Service Credential Request 202, theAccounting Manager 26 validates the former,step 204, and, if the validation was successful, responds with aService Credential 206 that 206 comprises: - The unique identifier from the
Service Credential Request 202. (b1) - The address of the
Service Provider 24. (b2) - A validity period or conditions for the use of the credential. (b6, b7)
- An electronic key that will allow the
User 22 and theService Provider 24 to authenticate one another. (b3) - A unique accounting session identifier to be used for accounting for the
User 22 for the particular use of the service. (b4) - An electronic signature that authenticates the
Accounting Manager 26 to theUser 22. (b5) - The
Accounting Manager 26 also sends aUser Credential 208 to theService Provider 24. TheUser Credential 208 comprises: - The address of the
User 22. (c1) - The unique accounting session identifier to be used for accounting for the
User 22 for the particular use of the service. (c2) - An electronic key that will allow the
User 22 and theService Provider 24 to authenticate one another. (c3) - An electronic signature that authenticates the
Accounting Manager 26 to theService Provider 24. (c4) - Policies (c5) that specify under what conditions the
User 22 may access the service, such as for example lifetime, time of day, maximum number of requests, and whether the user is allowed to change his address. In addition, there are accounting policies such as for example the data that is to be collected and the maximum time between accounting messages. - The
User 22 then sends aService Request 210 to request the service from theService Provider 24. ThisService Request 210 comprises: - The address of the
User 22. (d1) - The unique accounting session identifier. (d2)
- An electronic signature authenticating the
User 22. The signature is built using the electronic key provided by theAccounting Manager 26. (d3) - The
Service Provider 24 then validates theService Request 210, step 211, using information from the User Credential. if theService Request 210 is validated, the service is then initiated 212 by theService Provider 24, theUser 22, or by theService Provider 24 and theUser 22 together, and the service session begins. During the service session the content of any messages sent between theUser 22 and theService Provider 24 are specific to the service and fall outside the scope of the invention. However, these messages may comprise an electronic signature that authenticates them to the receiving entity. - In addition, depending on the configuration of the service and the accounting policies specified by the
Accounting Manager 26, theService Provider 24 may send one or moreInterim Accounting messages 214 to theAccounting Manager 26. EachInterim Accounting messages 214 comprises: - A unique identifier of the service. (e1)
- An indicator that the message comprises interim accounting data. (e2)
- The User Credential identifying the
User 22. (e3) - A unique accounting message identifier. (e4)
- Accounting data. (e5)
- The accounting session identifier. (e6)
- An electronic signature identifying the
Service Provider 24 to theAccounting Manager 26. (e7) - Upon reception of an
Interim Accounting message 214, theAccounting Manager 26 may respond with anAcknowledgement 216. - The
User 22 or theService Provider 24 may terminate the service session,step 218. - Once the service is terminated, the
Service Provider 24 sends to the Accounting Manager 26 aFinal Accounting message 220 comprising: - A unique identifier of the service.
- An indicator that the message comprises final accounting data.
- The User Credential identifying the
User 22. - A unique accounting message identifier.
- Accounting data.
- The accounting session identifier.
- An electronic signature identifying the
Service Provider 24 to theAccounting Manager 26. - The Accounting Manager acknowledges the
Final Accounting message 220 with anacknowledgement 221. - Every now and then, depending on pre-established policies agreed upon between the
Accounting Manager 26 and theAccounting Storage 28, the former sends its stored accounting data to the latter in aRecord Accounting message 222. Upon reception of this message, theAccounting Storage 28 stores the data and sends anAcknowledgement 224 to theAccounting Manager 26 that, upon reception of theAcknowledgement 224, deletes,step 226, the accounting data it sent to theAccounting Storage 28 in theRecord Accounting message 222. - FIG. 3 depicts an exemplary network node such as for example an
Accounting Manager 26. Thenetwork node 30 comprises acommunication unit 31 for communication with other nodes in the network and aprocessing unit 32 for processing data. The network node also has anetwork address 33. - While the description illustrates a peer-to-peer network, it should be understood that the present invention also could be used in other kinds of networks.
- Although several preferred embodiments of the methods, systems and nodes of the present invention have been illustrated in the accompanying Drawings and described in the foregoing Detailed Description, it will be understood that the invention is not limited to the embodiments disclosed, but is capable of numerous rearrangements, modifications and substitutions without departing from the spirit of the invention as set forth and defined by the following claims.
Claims (55)
1. A method for charging in a data communications network, the network comprising a User, a Service Provider that provides at least one service, and an Accounting Manager, the method comprising the steps of:
sending by the Accounting Manager a service credential to the User;
sending by the Accounting Manager a user credential to the Service Provider;
requesting by the User a service from the Service Provider, using information from the service credential;
validating by the Service Provider the request for a service, using information from the user credential;
initiating the service; and
sending by the Service Provider an accounting message relating to the service to the Accounting Manager.
2. The method according to claim 1 , further comprising, prior to the step of sending by the Service Provider an accounting message relating to the service to the Accounting Manager, the step of terminating the service.
3. The method according to claim 2 , wherein the accounting message is a Final accounting message, and the method further comprises, prior to the step of terminating the service, the step of sending by the Service Provider at least one Interim accounting message relating to the service to the Accounting Manager.
4. The method according to claim 1 , wherein the network further comprises an Accounting Storage, and the method further comprises, after the step of sending by the Service Provider an accounting message relating to the service to the Accounting Manager, the step of sending from the Accounting Manager to the Accounting Storage a Record Accounting message comprising accounting data.
5. The method according to claim 4 , further comprising the steps of:
storing by the Accounting Storage the accounting data from the Record Accounting message;
sending by the Accounting Storage an Acknowledgement to the Accounting Manager; and
upon reception of the Acknowledgement, deleting by the Accounting Manager the accounting data it sent to the Accounting Storage in the Record Accounting message.
6. The method according to claim 1 , further comprising, prior to the step of sending by the Accounting Manager a service credential to the User, the steps of:
selecting by the User a service;
sending by the User a service credential request related to the selected service to the Accounting Manager; and
validating by the Accounting Manager the service credential request.
7. The method according to claim 6 , wherein the service credential request comprises:
an indication of a requested service;
a unique request identifier;
a random number; and
an electronic signature.
8. The method according to claim 7 , wherein the service credential comprises:
the unique request identifier;
an address of the Service Provider;
an electronic key;
an accounting session identifier; and
an electronic signature.
9. The method according to claim 8 , wherein the service credential further comprises:
a validity period for the service credential.
10. The method according to claim 8 , wherein the service credential further comprises:
at least one condition for use of the credential.
11. The method according to claim 8 , wherein the user credential comprises:
an address of the User;
the accounting session identifier;
an electronic key; and
an electronic signature.
12. The method according to claim 11 , wherein the user credential further comprises policies regarding service access and accounting.
13. The method according to claim 11 , wherein the step of requesting by the User a service from the Service Provider further comprises sending from the User a service request to the Service Provider, wherein the service request comprises:
the address of the user;
the accounting session identifier; and
an electronic signature.
14. The method according to claim 1 , wherein the accounting message comprises:
an identifier of the service;
an indicator that the message comprises accounting data;
the user credential;
a unique accounting message identifier;
an accounting session identifier;
accounting data; and
an electronic signature.
15. A system for charging in a data communications network, the system comprising:
an Accounting Manager that:
sends a service credential to the User; and
sends a user credential to the Service Provider;
a User that requests a service from the Service Provider, using information from the service credential; and
a Service Provider that provides at least one service and that:
validates the service request, using information from the user credential; and
sends an accounting message relating to the service to the Accounting Manager.
16. The system according to claim 15 , wherein the accounting message is a Final accounting message, and wherein the Service Provider further sends at least one Interim accounting message relating to the service to the Accounting Manager.
17. The system according to claim 15 , wherein the system further comprises an Accounting Storage, and the Accounting Manager further sends a Record Accounting message comprising accounting data to the Accounting Storage.
18. The system according to claim 17 , wherein:
the Accounting Storage:
stores the accounting data from the Record Accounting message; and
sends an Acknowledgement to the Accounting Manager; and
the Accounting Manager further deletes the accounting data it sent to the Accounting Storage in the Record Accounting message upon reception of the Acknowledgement.
19. The system according to claim 15 , wherein the User further selects a service and sends a service credential request related to the selected service to the Accounting Manager, and the Accounting Manager further validates the service credential request prior to sending the service credential to the User.
20. The system according to claim 19 , wherein the service credential request comprises:
an indication of a requested service;
a unique request identifier;
a random number; and
an electronic signature.
21. The system according to claim 20 , wherein the service credential comprises:
the unique request identifier;
an address of the Service Provider;
an accounting session identifier;
an electronic key; and
an electronic signature.
22. The system according to claim 21 , wherein the service credential further comprises:
a validity period for the service credential.
23. The system according to claim 21 , wherein the service credential further comprises:
at least one condition for use of the credential.
24. The system according to claim 21 , wherein the user credential comprises:
an address of the User;
an accounting identifier;
an electronic key;
the accounting session identifier; and
an electronic signature.
25. The system according to claim 24 , wherein the user credential further comprises policies regarding service access and accounting.
26. The system according to claim 24 , wherein the User requests a service from the Service Provider by sending to the Service Provider a service request comprising:
the address of the user;
the accounting session identifier; and
an electronic signature.
27. The system according to claim 15 , wherein the accounting message comprises:
an identifier of the service;
an indicator that the message comprises accounting data;
the user credential;
a unique message identifier;
accounting data; and
an electronic signature.
28. The system according to claim 15 , wherein the User further initiates the requested service.
29. The system according to claim 15 , wherein the Account Manager further initiates the requested service.
30.A User node in a data communications network that further comprises a Service Provider and an Accounting Manager, the User node comprising:
a communication unit that:
receives a service credential from the Accounting Manager; and
requests a service from the Service Provider, using information from the service credential.
31. The User node according to claim 30 , wherein the communication unit further sends a service credential request to the Accounting Manager.
32. The User node according to claim 30 , wherein the User node further comprises a processing unit that activates the requested service.
33. An Accounting Manager in a data communications network that further comprises a User and a Service Provider, the Accounting Manager comprising:
a communication unit that:
sends a service credential to the User;
sends a user credential to the Service Provider; and
receives an accounting message from the Service Provider.
34. The Accounting Manager according to claim 33 , wherein the accounting message is a Final accounting message and the communication unit further receives at least one Interim accounting message from the Service Provider.
35. The Accounting Manager according to claim 33 , wherein the data communications network further comprises an Accounting Storage, and the communication unit further sends a Record Accounting message comprising accounting data to the Accounting Storage.
36. The Accounting Manager according to claim 35 , wherein the communication unit further receives an Acknowledgement from the Accounting Storage, and the Accounting Manager further comprises a processing unit that, upon reception of the Acknowledgement, deletes the accounting data it sent to the Accounting Storage in the Record Accounting message.
37. The Accounting Manager of claim 33 , wherein the communication unit further receives a service credential request from the User, and the Accounting Manager further comprises a processing unit that validates the service credential request prior to sending the service credential to the User
38. A Service Provider providing at least one service in a data communications network that further comprises a User and an Accounting Manager, wherein the Service Provider:
comprises a communication unit that:
receives a user credential from the Accounting Manager;
receives a request for a service from the User; and
sends an accounting message relating to the service to the Accounting Manager.
39. The Service Provider according to claim 38 , wherein accounting message is a Final accounting message and the communication unit further sends at least one Interim accounting message relating to the service to the Accounting Manager.
40. The Service Provider according to claim 38 further comprising a processing unit that activates the requested service.
41. The Service Provider according to claim 40 , wherein the processing unit further validates the request for a service.
42. A system for charging in a data communications network further comprising a User, the system comprising:
an Accounting Manager that:
sends a service credential to the User;
sends a user credential to the Service Provider; and
receives a request for a service from the User; and
a Service Provider that provides at least one service and that:
validates the service request, using information from the user credential; and
sends an accounting message relating to the service to the Accounting Manager.
43. The system according to claim 42 , wherein the accounting message is a Final accounting message, and wherein the Service Provider further sends at least one Interim accounting message relating to the service to the Accounting Manager.
44. The system according to claim 42 , wherein the system further comprises an Accounting Storage, and the Accounting Manager further sends a Record Accounting message comprising accounting data to the Accounting Storage.
45. The system according to claim 44 , wherein:
the Accounting Storage:
stores the accounting data from the Record Accounting message; and
sends an Acknowledgement to the Accounting Manager; and
the Accounting Manager further deletes the accounting data it sent to the Accounting Storage in the Record Accounting message upon reception of the Acknowledgement.
46. The system according to claim 42 , wherein the Accounting Manager further:
receives from the User a service credential request related to service selected by the User; and
validates the service credential request prior sending the service credential to the User.
47. The system according to claim 46 , wherein the service credential request comprises:
an indication of a requested service;
a unique request identifier;
a random number; and
an electronic signature.
48. The system according to claim 47 , wherein the service credential comprises:
the unique request identifier;
an address of the Service Provider;
an accounting session identifier;
an electronic key; and
an electronic signature.
49. The system according to claim 48 , wherein the service credential further comprises:
a validity period for the service credential.
50. The system according to claim 48 , wherein the service credential further comprises:
at least one condition for use of the credential.
51. The system according to claim 48 , wherein the user credential comprises:
an address of the User;
an accounting identifier;
an electronic key;
the accounting session identifier; and
an electronic signature.
52. The system according to claim 51 , wherein the user credential further comprises policies regarding service access and accounting.
53. The system according to claim 51 , wherein the request for a service is a service request comprising:
the address of the user;
the accounting session identifier; and
an electronic signature.
54. The system according to claim 42 , wherein the accounting message comprises:
an identifier of the service;
an indicator that the message comprises accounting data;
the user credential;
a unique message identifier;
accounting data; and
an electronic signature.
55. The system according to claim 42 , wherein the Account Manager further initiates the requested service.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/682,608 US20020165783A1 (en) | 2001-05-02 | 2001-09-26 | Accounting in peer-to-peer data communication networks |
AU2002252882A AU2002252882A1 (en) | 2001-05-02 | 2002-04-22 | Accounting in peer-to-peer data communication networks |
PCT/CA2002/000552 WO2002089407A2 (en) | 2001-05-02 | 2002-04-22 | Accounting in peer-to-peer data communication networks |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US28773401P | 2001-05-02 | 2001-05-02 | |
US09/682,608 US20020165783A1 (en) | 2001-05-02 | 2001-09-26 | Accounting in peer-to-peer data communication networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20020165783A1 true US20020165783A1 (en) | 2002-11-07 |
Family
ID=26964628
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/682,608 Abandoned US20020165783A1 (en) | 2001-05-02 | 2001-09-26 | Accounting in peer-to-peer data communication networks |
Country Status (3)
Country | Link |
---|---|
US (1) | US20020165783A1 (en) |
AU (1) | AU2002252882A1 (en) |
WO (1) | WO2002089407A2 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1544814A1 (en) * | 2003-12-19 | 2005-06-22 | Siemens Aktiengesellschaft | Method for billing a service in a communication network |
EP1544815A1 (en) * | 2003-12-19 | 2005-06-22 | Siemens Aktiengesellschaft | Method for billing a service in a communication network |
DE102004042559A1 (en) * | 2004-09-02 | 2006-03-23 | Siemens Ag | Tariff rate billing method for use in mobile communication network, involves transferring tariff rate credit note to service-tendering end point based on comparison of received information from peer-to-peer service-server |
US20060277092A1 (en) * | 2005-06-03 | 2006-12-07 | Credigy Technologies, Inc. | System and method for a peer to peer exchange of consumer information |
NL1030807C2 (en) * | 2005-12-29 | 2007-07-02 | Sping B V | Payment method for IP telephony, involves use of telephony service measuring module connected to account server so that duration of service is automatically recorded |
EP1819123A1 (en) * | 2006-02-13 | 2007-08-15 | Research In Motion Limited | Secure method of termination of service notification |
WO2008006294A1 (en) | 2006-07-03 | 2008-01-17 | Beijing Huaqi Information Digital Technology Co., Ltd. | Method, device and system of obtaing network information using device as service credential |
US20090132401A1 (en) * | 2007-11-19 | 2009-05-21 | Cisco Technology, Inc. | Generating a Single Advice of Charge Request for Multiple Sessions in a Network Environment |
US20090138295A1 (en) * | 2007-11-27 | 2009-05-28 | Cisco Technology, Inc. | Generating a Single Billing Record for Multiple Sessions in a Network Environment |
US20100138226A1 (en) * | 2005-08-10 | 2010-06-03 | Nokia Siemens Networks Gmbh & Co. Kg | Method and Arrangement for Controlling and Charging for Peer-to-Peer Services in an IP-based Communication Network |
US8560456B2 (en) | 2005-12-02 | 2013-10-15 | Credigy Technologies, Inc. | System and method for an anonymous exchange of private data |
CN104793993A (en) * | 2015-04-24 | 2015-07-22 | 江南大学 | Cloud computing task scheduling method of artificial bee colony particle swarm algorithm based on Levy flight |
US11729588B1 (en) | 2021-09-30 | 2023-08-15 | T-Mobile Usa, Inc. | Stateless charging and message handling |
US12041521B2 (en) | 2023-07-05 | 2024-07-16 | T-Mobile Usa, Inc. | Stateless charging and message handling |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5592620A (en) * | 1993-08-12 | 1997-01-07 | International Business Machines Corporation | System and method for controlling, monitoring and retrieving accounting data |
US6032118A (en) * | 1996-12-19 | 2000-02-29 | Northern Telecom Limited | Virtual private network service provider for asynchronous transfer mode network |
US6117188A (en) * | 1998-04-27 | 2000-09-12 | Cognet Corporation | System and method using token processing to control software distribution and desktop management in a computer network environment |
US6157953A (en) * | 1998-07-28 | 2000-12-05 | Sun Microsystems, Inc. | Authentication and access control in a management console program for managing services in a computer network |
US6170014B1 (en) * | 1998-03-25 | 2001-01-02 | Community Learning And Information Network | Computer architecture for managing courseware in a shared use operating environment |
US6219710B1 (en) * | 1997-05-30 | 2001-04-17 | Hilgrave Incorporated | Method and apparatus for peer-to-peer communication |
US6236981B1 (en) * | 1996-11-20 | 2001-05-22 | British Telecommunications Public Limited Company | Transaction system |
US6363411B1 (en) * | 1998-08-05 | 2002-03-26 | Mci Worldcom, Inc. | Intelligent network |
US6678733B1 (en) * | 1999-10-26 | 2004-01-13 | At Home Corporation | Method and system for authorizing and authenticating users |
US6834341B1 (en) * | 2000-02-22 | 2004-12-21 | Microsoft Corporation | Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet |
US6892210B1 (en) * | 2000-12-29 | 2005-05-10 | Worldsync, Inc. | Database management and synchronization across a peer-to-peer network |
US7013290B2 (en) * | 2001-08-03 | 2006-03-14 | John Allen Ananian | Personalized interactive digital catalog profiling |
US7027432B2 (en) * | 2000-03-20 | 2006-04-11 | At&T Corp. | Method and apparatus for coordinating a change in service provider between a client and a server with identity based service access management |
US7047406B2 (en) * | 2001-03-21 | 2006-05-16 | Qurlo Holdings, Inc. | Method and system for providing a secure peer-to-peer file delivery network |
US7054843B2 (en) * | 2000-01-15 | 2006-05-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus in a telecommunications system |
US7127606B2 (en) * | 1998-11-09 | 2006-10-24 | First Data Corporation | Account-based digital signature (ABDS) system |
US7136927B2 (en) * | 2001-01-22 | 2006-11-14 | Sun Microsystems, Inc. | Peer-to-peer resource resolution |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FI106343B (en) * | 1998-05-26 | 2001-01-15 | Ericsson Telefon Ab L M | Procedure and device for charging in a communication network |
-
2001
- 2001-09-26 US US09/682,608 patent/US20020165783A1/en not_active Abandoned
-
2002
- 2002-04-22 AU AU2002252882A patent/AU2002252882A1/en not_active Abandoned
- 2002-04-22 WO PCT/CA2002/000552 patent/WO2002089407A2/en not_active Application Discontinuation
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5592620A (en) * | 1993-08-12 | 1997-01-07 | International Business Machines Corporation | System and method for controlling, monitoring and retrieving accounting data |
US6236981B1 (en) * | 1996-11-20 | 2001-05-22 | British Telecommunications Public Limited Company | Transaction system |
US6032118A (en) * | 1996-12-19 | 2000-02-29 | Northern Telecom Limited | Virtual private network service provider for asynchronous transfer mode network |
US6219710B1 (en) * | 1997-05-30 | 2001-04-17 | Hilgrave Incorporated | Method and apparatus for peer-to-peer communication |
US6170014B1 (en) * | 1998-03-25 | 2001-01-02 | Community Learning And Information Network | Computer architecture for managing courseware in a shared use operating environment |
US6117188A (en) * | 1998-04-27 | 2000-09-12 | Cognet Corporation | System and method using token processing to control software distribution and desktop management in a computer network environment |
US6157953A (en) * | 1998-07-28 | 2000-12-05 | Sun Microsystems, Inc. | Authentication and access control in a management console program for managing services in a computer network |
US6363411B1 (en) * | 1998-08-05 | 2002-03-26 | Mci Worldcom, Inc. | Intelligent network |
US7127606B2 (en) * | 1998-11-09 | 2006-10-24 | First Data Corporation | Account-based digital signature (ABDS) system |
US6678733B1 (en) * | 1999-10-26 | 2004-01-13 | At Home Corporation | Method and system for authorizing and authenticating users |
US7054843B2 (en) * | 2000-01-15 | 2006-05-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus in a telecommunications system |
US6834341B1 (en) * | 2000-02-22 | 2004-12-21 | Microsoft Corporation | Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet |
US7027432B2 (en) * | 2000-03-20 | 2006-04-11 | At&T Corp. | Method and apparatus for coordinating a change in service provider between a client and a server with identity based service access management |
US6892210B1 (en) * | 2000-12-29 | 2005-05-10 | Worldsync, Inc. | Database management and synchronization across a peer-to-peer network |
US7136927B2 (en) * | 2001-01-22 | 2006-11-14 | Sun Microsystems, Inc. | Peer-to-peer resource resolution |
US7047406B2 (en) * | 2001-03-21 | 2006-05-16 | Qurlo Holdings, Inc. | Method and system for providing a secure peer-to-peer file delivery network |
US7013290B2 (en) * | 2001-08-03 | 2006-03-14 | John Allen Ananian | Personalized interactive digital catalog profiling |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080306747A1 (en) * | 2003-12-19 | 2008-12-11 | Walter Held | Method for Charging for a Service in a Communication Network |
EP1544815A1 (en) * | 2003-12-19 | 2005-06-22 | Siemens Aktiengesellschaft | Method for billing a service in a communication network |
WO2005062265A1 (en) * | 2003-12-19 | 2005-07-07 | Siemens Aktiengesellschaft | Method for charging for a service in a communication network |
WO2005062264A1 (en) * | 2003-12-19 | 2005-07-07 | Siemens Aktiengesellschaft | Method for charging for a service in a communication network |
US20070162364A1 (en) * | 2003-12-19 | 2007-07-12 | Walter Held | Method for charging for a service in a communication network |
EP1544814A1 (en) * | 2003-12-19 | 2005-06-22 | Siemens Aktiengesellschaft | Method for billing a service in a communication network |
DE102004042559A1 (en) * | 2004-09-02 | 2006-03-23 | Siemens Ag | Tariff rate billing method for use in mobile communication network, involves transferring tariff rate credit note to service-tendering end point based on comparison of received information from peer-to-peer service-server |
US20060122898A1 (en) * | 2004-09-02 | 2006-06-08 | Siemens Aktiengesellschaft | Method and device for billing charges in a communication network with point-to-point connections |
US20060277092A1 (en) * | 2005-06-03 | 2006-12-07 | Credigy Technologies, Inc. | System and method for a peer to peer exchange of consumer information |
US20100138226A1 (en) * | 2005-08-10 | 2010-06-03 | Nokia Siemens Networks Gmbh & Co. Kg | Method and Arrangement for Controlling and Charging for Peer-to-Peer Services in an IP-based Communication Network |
US8560456B2 (en) | 2005-12-02 | 2013-10-15 | Credigy Technologies, Inc. | System and method for an anonymous exchange of private data |
NL1030807C2 (en) * | 2005-12-29 | 2007-07-02 | Sping B V | Payment method for IP telephony, involves use of telephony service measuring module connected to account server so that duration of service is automatically recorded |
US20110138180A1 (en) * | 2006-02-13 | 2011-06-09 | Research In Motion Limited | Secure method of termination of service notification |
EP1819123A1 (en) * | 2006-02-13 | 2007-08-15 | Research In Motion Limited | Secure method of termination of service notification |
US8086858B2 (en) | 2006-02-13 | 2011-12-27 | Research In Motion Limited | Secure method of termination of service notification |
US20070208942A1 (en) * | 2006-02-13 | 2007-09-06 | Research In Motion Limited | Secure method of termination of service notification |
US7890760B2 (en) | 2006-02-13 | 2011-02-15 | Research In Motion Limited | Secure method of termination of service notification |
US20100313022A1 (en) * | 2006-02-13 | 2010-12-09 | Research In Motion Limited | Secure method of termination of service notification |
US7802097B2 (en) * | 2006-02-13 | 2010-09-21 | Research In Motion Limited | Secure method of termination of service notification |
WO2008006294A1 (en) | 2006-07-03 | 2008-01-17 | Beijing Huaqi Information Digital Technology Co., Ltd. | Method, device and system of obtaing network information using device as service credential |
US20090292815A1 (en) * | 2006-07-03 | 2009-11-26 | Beijing Huaqi Information Digital Technology Co., Ltd. | Method, device and system of obtaining network information using device as service credential |
US8046459B2 (en) * | 2006-07-03 | 2011-10-25 | A aiǵo Digital Technology Co., Ltd. | Method, device and system of obtaining network information using device as service credential |
EP2045955A4 (en) * | 2006-07-03 | 2012-01-25 | Beijing Huaqi Inf Digital Sci | Method, device and system of obtaing network information using device as service credential |
EP2045955A1 (en) * | 2006-07-03 | 2009-04-08 | Beijing Huaqi Information Digital Technology Co., Ltd. | Method, device and system of obtaing network information using device as service credential |
US20090132401A1 (en) * | 2007-11-19 | 2009-05-21 | Cisco Technology, Inc. | Generating a Single Advice of Charge Request for Multiple Sessions in a Network Environment |
US9209983B2 (en) * | 2007-11-19 | 2015-12-08 | Cisco Technology, Inc. | Generating a single advice of charge request for multiple sessions in a network environment |
US20090138295A1 (en) * | 2007-11-27 | 2009-05-28 | Cisco Technology, Inc. | Generating a Single Billing Record for Multiple Sessions in a Network Environment |
US9202237B2 (en) * | 2007-11-27 | 2015-12-01 | Cisco Technology, Inc. | Generating a single billing record for multiple sessions in a network environment |
CN104793993A (en) * | 2015-04-24 | 2015-07-22 | 江南大学 | Cloud computing task scheduling method of artificial bee colony particle swarm algorithm based on Levy flight |
US11729588B1 (en) | 2021-09-30 | 2023-08-15 | T-Mobile Usa, Inc. | Stateless charging and message handling |
US12041521B2 (en) | 2023-07-05 | 2024-07-16 | T-Mobile Usa, Inc. | Stateless charging and message handling |
Also Published As
Publication number | Publication date |
---|---|
AU2002252882A1 (en) | 2002-11-11 |
WO2002089407A3 (en) | 2003-07-10 |
WO2002089407A2 (en) | 2002-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100800339B1 (en) | Method and system for user-determined authentication and single-sign-on in a federated environment | |
US7444509B2 (en) | Method and system for certification path processing | |
US6490679B1 (en) | Seamless integration of application programs with security key infrastructure | |
US7287271B1 (en) | System and method for enabling secure access to services in a computer network | |
US8200834B2 (en) | Method and system for secure server-based session management using single-use HTTP cookies | |
US7395424B2 (en) | Method and system for stepping up to certificate-based authentication without breaking an existing SSL session | |
US8621206B2 (en) | Authority-neutral certification for multiple-authority PKI environments | |
US7496755B2 (en) | Method and system for a single-sign-on operation providing grid access and network access | |
AU2003212723B2 (en) | Single sign-on secure service access | |
US20060294366A1 (en) | Method and system for establishing a secure connection based on an attribute certificate having user credentials | |
US20040139319A1 (en) | Session ticket authentication scheme | |
MXPA04007546A (en) | Method and system for providing third party authentification of authorization. | |
EP2404427B1 (en) | Method and apparatus for securing network communications | |
US20020165783A1 (en) | Accounting in peer-to-peer data communication networks | |
US20020035686A1 (en) | Systems and methods for secured electronic transactions | |
CN107347073B (en) | A kind of resource information processing method | |
Chae et al. | A study on secure user authentication and authorization in OAuth protocol | |
WO2022033350A1 (en) | Service registration method and device | |
US20020165976A1 (en) | Software deployment in a data communications network | |
JP3374716B2 (en) | Information transmission / reception control method having user authentication function and recording medium recording the method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: TELEFONAKTIEBOLAGET L M ERICSSON, SWEDEN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GONTHIER, JEAN-CHARLES;RICHER, ERIC;REEL/FRAME:012332/0617;SIGNING DATES FROM 20011009 TO 20011010 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |